1. Formal models and techniques for analyzing security protocols /
Author: edited by Véronique Cortier and Steve Kremer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Electronic information resources-- Access control
Classification :
QA76
.
9
.
A25
F654
2011


2. Handbook of research on information security and assuranc
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Handbooks, manuals, etc,Electronic information resources--Access control--Handbooks, manuals, etc,Computer crimes--Prevention--Handbooks, manuals, etc
Classification :
TK
,
5105
.
59
,.
H353
,
2009


3. Handbook of research on information security and assurance
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
Library: Insurance Research Institute Library (Tehran)
Subject: Computer networks, Security measures, Handbooks, manuals, etc,Electronic information resources, Access control, Handbooks, manuals, etc,Computer crimes, Prevention, Handbooks, manuals, etc
Classification :
TK5105
.
59
.
H
2009


4. Handbook of research on information security and assurance
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors].
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Electronic information resources--Access control,Computer crimes--Prevention
Classification :
TK
5105
.
59
.
H353
2009
R


5. Handbook of research on information security and assurance
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Handbooks, manuals, etc ; Electronic information resources ; Access control ; Handbooks, manuals, etc ; Computer crimes ; Prevention ; Handbooks, manuals, etc ;

6. Penetration tester's open source toolkit
Author: Johnny Long...]et al.[; foreword by Max Moser
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Computer hackers,Access control ، Electronic information resources,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
P46
2006


7. Security intelligence :
Author: Qing Li, Gregory Clark
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Electronic information resources-- Access control.,Computer networks-- Security measures. World Wide Web-- Security measures.,Computer science.,Network security.
Classification :
TK5105
.
59


8. Security intelligence :a practitioner's guide to solving enterprise security challenges
Author: Li, Qing
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Access control ، Electronic information resources,Security measures ، Computer networks,، Computer security,Access control ، Electronic information resources
Classification :
TK
5105
.
59
.
L52


9. Trusted computing platforms
Author: / Siani Pearson, editor
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Standards,Computer networks- Security measures,Electronic information resources- Access control
Classification :
QA76
.
9
.
A25
,
T75
2003

